CVE-2023-25172
Severity CVSS v4.0:
Pending analysis
Type:
CWE-79
Cross-Site Scripting (XSS)
Publication date:
17/03/2023
Last modified:
23/03/2023
Description
Discourse is an open-source discussion platform. Prior to version 3.0.1 of the `stable` branch and version 3.1.0.beta2 of the `beta` and `tests-passed` branches, a maliciously crafted URL can be included in a user's full name field to to carry out cross-site scripting attacks on sites with a disabled or overly permissive CSP (Content Security Policy). Discourse's default CSP prevents this vulnerability. The vulnerability is patched in version 3.0.1 of the `stable` branch and version 3.1.0.beta2 of the `beta` and `tests-passed` branches. As a workaround, enable and/or restore your site's CSP to the default one provided with Discourse.
Impact
Base Score 3.x
5.40
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:discourse:discourse:*:*:*:*:stable:*:*:* | 3.0.1 (excluding) | |
| cpe:2.3:a:discourse:discourse:*:*:*:*:beta:*:*:* | 3.1.0 (excluding) | |
| cpe:2.3:a:discourse:discourse:3.1.0:beta1:*:*:beta:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://github.com/discourse/discourse/commit/1a5a6f66cb821ed29a737311d6fdc2eba5adc915
- https://github.com/discourse/discourse/commit/c186a46910431020e8efc425dec2133e7a99fa9a
- https://github.com/discourse/discourse/pull/20008
- https://github.com/discourse/discourse/pull/20009
- https://github.com/discourse/discourse/security/advisories/GHSA-7pm2-prxw-wrvp



